Detect insider threats with Linux auditing

Detect insider threats with Linux auditing – Organizations of all sizes need to mitigate the risk of insider threats. Misconduct by authorized users represents a grave threat to an organization. According to the 2005 Computer Security Institute and Federal Bureau of Investigation Computer Crime and Security Survey, organizations reported that computer intrusions from inside sources accounted for nearly half of all incidents. You can secure your network perimeter with intrusion detection systems, firewalls, and virus scanners, but don’t neglect to monitor authorized users. The Linux Audit daemon can help you detect violations of your security policies. [Linux.com]
Detect insider threats with Linux auditing

Organizations of all sizes need to mitigate the risk of insider threats. Misconduct by authorized users represents a grave threat to an organization. According to the 2005 Computer Security Institute and Federal Bureau of Investigation Computer Crime and Security Survey, organizations reported that computer intrusions from inside sources accounted for nearly half of all incidents. You can secure your network perimeter with intrusion detection systems, firewalls, and virus scanners, but don’t neglect to monitor authorized users. The Linux Audit daemon can help you detect violations of your security policies.

[Linux.com]


Did you like this article?


0 Shares:
You May Also Like

Network Solutions (NSI) is registering every domain name checked throug their WHOIS

I always thought there was something really strange about the WHOIS searches done at Registrars. Specifically the searches would have to be done on their website, a normal "whois" lookup through Linux wouldn't show up registered the next day.
A story is developing regarding domain name registrar Network Solutions front running domains. According to multiple sources on DomainState.com, it appears that domains searched via NSI are being purchased by the registrar thereby preventing a registrant from purchasing it at any other registrar other than NSI. As an example, a random domain which DNN searches such as HowDoesThisDomainTasteTaste.com can be seen in this whois search to now be unavailable to register at other registrars but at NSI it can be purchased
Full article at domainnamenews.com
Read More

First Google Android Phone Approved by the FCC

The first Google Android Phone has been approved by the FCC. The HTC dream will be the first Android phone.
Today, the news broke that the HTC Dream, the first handset to run Android (aka "the Google Phone") has been approved by the FCC. In the documents provided, it appears that we have now a release date for this highly anticipated phone: November 10th, 2008.
Another challenger appears! Read the full article at readwriteweb.com
Read More